ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
Database intrusion detection using role and user behavior based risk assessment
Journal of Information Security and Applications
◽
10.1016/j.jisa.2020.102654
◽
2020
◽
Vol 55
◽
pp. 102654
Author(s):
Indu Singh
◽
Narendra Kumar
◽
Srinivasa K.G.
◽
Tript Sharma
◽
Vaibhav Kumar
◽
...
Keyword(s):
Risk Assessment
◽
Intrusion Detection
◽
User Behavior
◽
Behavior Based
◽
Database Intrusion Detection
Download Full-text
Related Documents
Cited By
References
User Behavior-Based Intrusion Detection Using Statistical Techniques
Communications in Computer and Information Science - Advanced Informatics for Computing Research
◽
10.1007/978-981-13-3143-5_39
◽
2018
◽
pp. 480-489
◽
Cited By ~ 1
Author(s):
Zakiyabanu S. Malek
◽
Bhushan Trivedi
◽
Axita Shah
Keyword(s):
Intrusion Detection
◽
User Behavior
◽
Statistical Techniques
◽
Behavior Based
Download Full-text
Online Database Intrusion Detection System Based on Query Signatures
Journal of University of Human Development
◽
10.21928/juhd.20170315.14
◽
2017
◽
Vol 3
(1)
◽
pp. 282-287
Author(s):
Alaa Jumaa
◽
◽
Awezan Omar
Keyword(s):
Intrusion Detection
◽
Intrusion Detection System
◽
Detection System
◽
Online Database
◽
Database Intrusion Detection
Download Full-text
Application of OPTICS and ensemble learning for Database Intrusion Detection
Journal of King Saud University - Computer and Information Sciences
◽
10.1016/j.jksuci.2019.05.001
◽
2019
◽
Cited By ~ 2
Author(s):
Sharmila Subudhi
◽
Suvasini Panigrahi
Keyword(s):
Intrusion Detection
◽
Ensemble Learning
◽
Database Intrusion Detection
Download Full-text
SFIM: Identify user behavior based on stable features
Peer-to-Peer Networking and Applications
◽
10.1007/s12083-021-01214-2
◽
2021
◽
Author(s):
Hua Wu
◽
Qiuyan Wu
◽
Guang Cheng
◽
Shuyi Guo
◽
Xiaoyan Hu
◽
...
Keyword(s):
User Behavior
◽
Behavior Based
Download Full-text
A Practical Database Intrusion Detection System Framework
2009 Ninth IEEE International Conference on Computer and Information Technology
◽
10.1109/cit.2009.69
◽
2009
◽
Cited By ~ 4
Author(s):
Yawei Zhang
◽
Xiaojun Ye
◽
Feng Xie
◽
Yong Peng
Keyword(s):
Intrusion Detection
◽
Intrusion Detection System
◽
Detection System
◽
System Framework
◽
Database Intrusion Detection
Download Full-text
Applying semantic web and user behavior analysis to enforce the intrusion detection system
2009 International Conference for Internet Technology and Secured Transactions, (ICITST)
◽
10.1109/icitst.2009.5402616
◽
2009
◽
Cited By ~ 2
Author(s):
Y.-T.F. Chan
◽
C.A. Shoniregun
◽
G.A. Akmayeva
◽
A. Al-Dahoud
Keyword(s):
Intrusion Detection
◽
Semantic Web
◽
Behavior Analysis
◽
Intrusion Detection System
◽
User Behavior
◽
Detection System
◽
User Behavior Analysis
Download Full-text
A real-time risk assessment model for intrusion detection systems
2017 International Symposium on Networks, Computers and Communications (ISNCC)
◽
10.1109/isncc.2017.8071990
◽
2017
◽
Cited By ~ 2
Author(s):
El Mostapha Chakir
◽
Mohamed Moughit
◽
Youness Idrissi Khamlichi
Keyword(s):
Risk Assessment
◽
Intrusion Detection
◽
Real Time
◽
Assessment Model
◽
Intrusion Detection Systems
◽
Risk Assessment Model
◽
Detection Systems
Download Full-text
Research on Correlation Analysis of Power User Behavior Based on Coupled Meteorological Factors
10.1109/scems52239.2021.9646162
◽
2021
◽
Author(s):
Yixiao Li
◽
Tianguang Lv
◽
Xin Zhao
◽
Jiyan Liu
◽
Wenjie Ju
◽
...
Keyword(s):
Correlation Analysis
◽
User Behavior
◽
Meteorological Factors
◽
Behavior Based
Download Full-text
Performance of User Behavior-Based Similarity on Top-N Recommendation
10.1109/iceeie52663.2021.9616734
◽
2021
◽
Author(s):
Triyanna Widiyaningtyas
◽
Indriana Hidayah
◽
Teguh Bharata Adji
Keyword(s):
User Behavior
◽
Behavior Based
Download Full-text
Dynamic User Behavior-Based Piracy Propagation Monitoring in Wireless Peer-to-Peer Networks
Behavior and Social Computing - Lecture Notes in Computer Science
◽
10.1007/978-3-319-04048-6_5
◽
2013
◽
pp. 44-55
◽
Cited By ~ 1
Author(s):
Benke Qu
◽
Wenjia Niu
◽
Tianqing Zhu
◽
Lei Wu
◽
Shijun Liu
◽
...
Keyword(s):
User Behavior
◽
Peer To Peer
◽
Peer Networks
◽
Peer To Peer Networks
◽
Behavior Based
Download Full-text
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close